posted by organizer: sigdrmposter || 7031 views || tracked by 6 users: [display]

MTAP SI MSNSA 2015 : Springer MTAP Special Issue on Multimedia Social Network Security and Applications


When N/A
Where N/A
Submission Deadline Jan 15, 2016
Notification Due Mar 15, 2016
Final Version Due Sep 15, 2016
Categories    social network   security   multimedia   applications

Call For Papers

Multimedia Tools and Applications
(A Springer Journal, SCI JCR IF=1.346)
Call for Papers
Special Issue on Multimedia Social Network Security and Applications

Aims and Scopes
In the increasingly inter-connected society, multimedia social network (MSN) has become a ‘mainstream’ tool used by online users to connect and share contents with other users 24/7 in real-time. It is, therefore, unsurprising that MSN has become a salient area of inquiry by computer scientists and computer security researchers. For example, researchers need to design intelligent computing and soft computing technologies to improve multimedia system functions, efficiency and performance, and improving user’s sharing experiences (e.g. using recommendation systems and more effective algorithms). In addition, security of users and data are also an ongoing topic of interest and importance due to the ease in producing and sharing user and multimedia content using MSNs. In recent years, we have seen advances in multimedia system security and soft computing for MSN applications, such as “hard” security mechanisms (e.g. protocols and methodologies) and “soft” computing methods (e.g. machine learning and rough set), as well as research efforts in trust assessment, risk management and social factors to understand the trade-off between the effectiveness and security in MSNs.
This special issue aims to bring together researchers in both academia and industry to publish cutting edge research on the following:
 Multimedia social network security architecture, model and networking
 Cryptographic methods for multimedia social network and system security
 Reactive watermarking and forensics for multimedia content
 Digital rights management, usage control and privacy protection for multimedia social network
 Soft computing techniques for multimedia social network applications, including neural network, rough set and machine learning
 Multimedia recommendation systems and highly-efficient algorithms for multimedia social network applications
 Trust assessment, risk management and social-factor considerations in multimedia social network applications
 Personal and mobile multimedia social network applications
 Multimedia social network-oriented prototypes, cases studies and other applications
High quality survey papers on the above topics are also welcome.
Submissions Guideline
Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference. If the submission is an extended version of a previously published workshop or conference paper, this should also be explicitly mentioned in the cover letter, the published paper must be cited in the submitted journal paper, and the submitted journal paper must technically extend the conference version, by 30% according to general rules; i.e., the technical contribution in the journal version must be extended beyond what was presented in the conference version.
Authors must follow the formatting and submission instructions of MTAP at and follow the "Submit Online" link on that page. Please make sure you select the SI title “Multimedia Social Network Security and Applications” at the column of “Article Type” when you submit on-line, and mention in your cover letter that you are submitting to this special issue.
All submitted papers will be peer reviewed by at least three reviewers according to the usual standards of this journal, and will be evaluated on the basis of originality, quality and relevance to this Special Issue and the journal, and on the basis of clarity and correct usage of English.
If you have any question, please do not hesitate to contact the corresponding GE, Prof. Zhiyong Zhang, by and
Paper submission: January 15, 2016
1st round review notification: March 15, 2016
1st revision due: June 1, 2016
2nd round review notification: July 1, 2016
2nd revision due: August 15, 2016
Final acceptance: September 15, 2016
Publication (Tentative): The last quarter of 2016

Guest Editors
Zhiyong Zhang (Corresponding GE)
Visiting Professor, Iowa State University, Ames, Iowa, USA;
Henan Province Distinguished Professor, Henan University of Science & Technology, Luoyang, Henan, P. R. of China

Kim-Kwang Raymond Choo
Fulbright Scholar and Senior Researcher, University of South Australia, Adelaide, South Australia, Australia

Related Resources

AltMM SI 2020   Special Issue on Multimedia Alternate Realities: enabling technologies, mediated interactions and experiences
SP 2020   IEEE Symposium on Security and Privacy
SPRINGER BOOK SERIES 2020   Digital Literacy and Socio-Cultural Acceptance of ICT in Developing Countries
SIPRO 2020   6th International Conference on Signal and Image Processing
ICME 2020   IEEE International Conference on Multimedia and Expo
ICDM 2020   20th Industrial Conference on Data Mining ICDM 2020
CBIoT 2020   International Conference on Cloud, Big Data and IoT
ICSD 2020   8th International Conference on Sustainable Development,9 - 10 September ICSD 2020
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security